Networks Training

  • About
  • My Books
  • SUGGESTED TRAINING
  • HOME
  • Cisco Networking
    • Cisco General
    • Cisco IOS
    • Cisco VPN
    • Cisco Wireless
  • Cisco ASA
    • Cisco ASA General
    • Cisco ASA Firewall Configuration
  • Certifications Training
    • CCNA Training
    • Cisco Certifications
    • I.T Training
  • General
    • General Networking
    • IP Telephony
    • Network Security
    • Product Reviews
    • Software
  • Cisco Routers
  • Cisco Switches
You are here: Home / Cisco Wireless / Cisco Router WiFi Wireless Configuration – 881W

Cisco Router WiFi Wireless Configuration – 881W

Written By Harris Andrea

In today’s Internet world, a WiFi connection is a must in any enterprise network, either for employees or for guests and other customers that are requesting a wireless connection for better productivity. There is a study showing that 5-7 years ago when WiFi was at its beginning stages, only 10% of devices were connected to it (most of them being laptops). Now at the beginning of the IOT (Internet of Things) era, Wi-Fi is being used more than the fixed Ethernet line mostly because there is an increased number of devices that are always connected (smart phones, tablets, TVs, home security systems etc).

In this tutorial we will discuss WiFi configuration on Cisco 881W router (shown on the image below). This tutorial is also applicable for other WiFi models such as Cisco 891W, 886W, 888W etc.

cisco-881w

Usually, Cisco’s recommendation for an enterprise Wi-Fi solution is to use a Wireless LAN Controller (WLAN) which will manage and control the wireless Access Points (AP) of the whole WiFi network. However, in smaller SOHO networks, a basic WiFi solution usually involves a small size router equipped with WiFi hardware.

Cisco has released such WiFi routers in the 800 and 1900 series that have a built in AP. In this tutorial we will see how to configure a Cisco 881W router, both the WiFi and the router configuration commands.

The scenario examined in this post is to have two WiFi SSIDs, one for Employees and one for Visitors. Each SSID must be mapped to a particular VLAN as shown below:

  • SSID “Employees” : vlan 10 (192.168.10.0/24)
  • SSID “Visitors” : vlan 20 (192.168.20.0/24)

Note: The vlans must be created on both the AP and the router itself.

Table of Contents

  • Configuration of Cisco 881W:
    • Access Point Configuration
    • Router Configuration
    • DOWNLOAD ARTICLE AS PDF FILE HERE
  • Related Posts

Configuration of Cisco 881W:

Note: The wireless Access Point (AP) inside the Cisco 881w is a separate module and you must connect to it from the router.

To connect to the AP side of the router you must issue the following command:

service-module wlan-ap 0 session

You can use Cisco/Cisco as username/password

To disconnect from the AP, you need to use the following keyboard combination:

Control-Shift-6 x

Access Point Configuration

Configure SSIDs inside the AP environment:

Company_AP (config)# dot11 ssid Employees < —– Name of the SSID
Company_AP (config-ssid)# vlan 10                 < —– Vlan Used
Company_AP (config-ssid)# authentication open
Company_AP (config-ssid)# authentication key-management wpa < —— Authentication method
Company_AP (config-ssid)# guest-mode
Company_AP (config-ssid)# mbssid guest-mode < —— Required when broadcasting multiple SSIDs
Company_AP (config-ssid)# infrastructure-ssid optional
Company_AP (config-ssid)# wpa-psk ascii 0 [employees_password ] < —— Sets the SSID password
Company_AP (config)# dot11 ssid Visitors
Company_AP (config-ssid)# vlan 20
Company_AP (config-ssid)# authentication open
Company_AP (config-ssid)# authentication key-management wpa
Company_AP (config-ssid)# guest-mode
Company_AP (config-ssid)# mbssid guest-mode
Company_AP (config-ssid)# infrastructure-ssid optional
Company_AP (config-ssid)# wpa-psk ascii 0 [visitors_password]

MORE READING:  Configuration of Cisco WPA2 Enterprise and Personal on WLAN using GUI

Company_AP (config)# dot11 vlan-name vlan10 vlan10 < — Maps the vlan number to the vlan name
Company_AP (config)# dot11 vlan-name vlan20 vlan20 < — Maps the vlan number to the vlan name

Configure the radio interface and assign the SSIDs

Company_AP (config)# interface Dot11Radio0  < —- The radio interface
Company_AP (config-if)# no shutdown
Company_AP (config-if)# encryption vlan10 mode ciphers tkip  < —– The encryption being used
Company_AP (config-if)# encryption vlan20 mode ciphers tkip
Company_AP (config-if)# ssid Employees  < — SSID assigned to this radio interface for broadcasting
Company_AP (config-if)# ssid Visitors  < — SSID assigned to this radio interface for broadcasting
Company_AP (config-if)# mbssid       < —- broadcast both SSIDs
Company_AP (config-if)# station-role root   < – — The AP works as a standalone AP
Company_AP (config-if)# speed  basic-1.0 2.0 5.5 11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m8. m9. m10. m11. m12. m13. m14. m15.   <—- sets the speeds for 802.11 b/g/n

Configure the Dot11Radio0 radio sub-interfaces

Company_AP (config)# interface Dot11Radio0.10   < – Create the subinterface
Company_AP (config-subif)# encapsulation dot1Q 10 < —- Sets the encapsulation and vlan
Company_AP (config-if)#  no shutdown
Company_AP (config-subif)# no ip route-cache
Company_AP (config-subif)# bridge-group 10  < —– maps the subinterface to a specific bridge group
Company_AP (config-subif)# bridge-group 10 subscriber-loop-control < — Enables loop control on virtual circuits associated with a bridge group.
Company_AP (config-subif)# bridge-group 10 block-unknown-source < — Blocks traffic that comes from unknown MAC address sources
Company_AP (config-subif)# no bridge-group 10 source-learning
Company_AP (config-subif)# no bridge-group 10 unicast-flooding
Company_AP (config-subif)# bridge-group 10 spanning-disabled

Company_AP (config)# interface Dot11Radio0.20
Company_AP (config-subif)# encapsulation dot1Q 20
Company_AP (config-if)#  no shutdown
Company_AP (config-subif)# no ip route-cache
Company_AP (config-subif)# bridge-group 20
Company_AP (config-subif)# bridge-group 20 subscriber-loop-control
Company_AP (config-subif)# bridge-group 20 block-unknown-source
Company_AP (config-subif)# no bridge-group 20 source-learning
Company_AP (config-subif)# no bridge-group 20 unicast-flooding
Company_AP (config-subif)# bridge-group 20 spanning-disabled

Configure Gi0, subinterfaces and BVI on the AP

As I mentioned before, the AP side is separated from the router itself and you can regard it as a switch. At this point we configure the downlink to the router (GigabitEthernet0 being the downlink interface). The rest of the config is similar to the above configuration for Dot11Radio0 interface.

MORE READING:  Next Generation Wireless - Wireless Mesh Solution

Company_AP (config)# interface GigabitEthernet0
Company_AP (config-if)# description downlink to the router  < — see description
Company_AP (config-if)#  no shutdown
Company_AP (config-if)# no ip address

Company_AP (config)# interface GigabitEthernet0.10
Company_AP (config-if)#  encapsulation dot1Q 10
Company_AP (config-if)#  no shutdown
Company_AP (config-if)#  no ip route-cache
Company_AP (config-if)#  bridge-group 10
Company_AP (config-if)#  no bridge-group 10 source-learning
Company_AP (config-if)#  bridge-group 10 spanning-disabled
Company_AP (config-if)# exit

Company_AP (config)# interface GigabitEthernet0.20
Company_AP (config-if)# encapsulation dot1Q 20
Company_AP (config-if)# no shutdown
Company_AP (config-if)# no ip route-cache
Company_AP (config-if)# bridge-group 20
Company_AP (config-if)# no bridge-group 20 source-learning
Company_AP (config-if)# bridge-group 20 spanning-disabled
Company_AP (config-if)# exit

Company_AP (config)# interface BVI1
Company_AP (config-if)# ip address 192.168.10.10
Company_AP (config-if)# no ip route-cache

NOTE:
The BVI interface above is actually the management interface of the AP and best practice is to assign an IP address from the trusted LAN (employees LAN vlan10).

Remember to enable routing for bridge 10.

Company_AP (config)# bridge 10 route ip

At this point you can exit the AP side configuration using “Control-Shift-6 x” command

Router Configuration

Configure VLANS, Interfaces, DHCP and uplink to the AP on the router :

Vlans:
Company_Router(config)#vlan 10
Company_Router(config)#vlan 20
Interfaces:
Company_Router (config)# interface Vlan10
Company_Router (config-if)# description Employees
Company_Router (config-if)# ip address 192.168.10.1 255.255.255.0
Company_Router (config-if)# ip nat insideCompany_Router (config)# interface Vlan20
Company_Router (config-if)# description Visitors
Company_Router (config-if)# ip address 192.168.20.1 255.255.255.0
Company_Router (config-if)# ip nat inside
DHCP:
Company_Router(config)# ip dhcp pool Employees
Company_Router(dhcp-config)# network 192.168.10.0 255.255.255.0
Company_Router(dhcp-config)# dns-server 8.8.8.8
Company_Router(dhcp-config)# default-router 192.168.10.1
Company_Router(config)# ip dhcp pool Visitors
Company_Router(dhcp-config)# network 192.168.20.0 255.255.255.0
Company_Router(dhcp-config)# default-router 192.168.20.1
Company_Router(dhcp-config)# dns-server 8.8.8.8
Uplink to AP:
Company_Router(config)# interface Wlan-GigabitEthernet0
Company_Router(config-if)# description uplink to AP
Company_Router(config-if)# switchport mode trunk < — on the AP side remember that there are subinterfaces configured so we must set this side to trunk mode to allow tagging of vlan 10 and 20
WAN interface:
Company_Router(config)# interface Fa4
Company_Router(config-if)# description TO ISP
Company_Router(config-if)# ip address 1.1.1.1 255.255.255.0
Company_Router(config-if)#no shutdown
Company_Router(config-if)#ip nat outside
ACL matching the networks:
Company_Router(config)# ip access-list extended NAT_ACL
Company_Router(config-acl)#permit ip 192.168.10.0 0.0.0.255 any
Company_Router(config-acl)#permit ip 192.168.20.0 0.0.0.255 any
NAT:
Company_Router(config)#ip nat inside source list NAT_ACL interface Fa4 overload
At this point we have finished configuring both the AP with the interfaces and SSID’s and also the router for basic internet access.

DOWNLOAD ARTICLE AS PDF FILE HERE

Related Posts

  • How to Setup Cisco Meraki WiFi Access Point Devices (With Pictures)
  • Configuration of Cisco WPA2 Enterprise and Personal on WLAN using GUI
  • Converting an Autonomous Access Point to Lightweight AP
  • Cisco Wireless LAN Controller Basic Configuration
  • Aironet 1242 AG Access Points dropping up and down

Filed Under: Cisco Wireless

Download Free Cisco Commands Cheat Sheets

Enter your Email below to Download our Free Cisco Commands Cheat Sheets for Routers, Switches and ASA Firewalls.

We use Elastic Email as our marketing automation service. By submitting this form, you agree that the information you provide will be transferred to Elastic Email for processing in accordance with their Terms of Use and Privacy Policy. Also, you allow me to send you informational and marketing emails from time-to-time.

About Harris Andrea

Harris Andrea is an Engineer with more than two decades of professional experience in the fields of TCP/IP Networks, Information Security and I.T. Over the years he has acquired several professional certifications such as CCNA, CCNP, CEH, ECSA etc.

He is a self-published author of two books ("Cisco ASA Firewall Fundamentals" and "Cisco VPN Configuration Guide") which are available at Amazon and on this website as well.

Comments

  1. Victor Katona says

    August 12, 2015 at 6:30 pm

    It is a great write up. Do you have something like this for the Cisco Controller (AIR-CT2504-K9) based AP s?

  2. Harris Andrea says

    August 13, 2015 at 4:52 am

    Hi Victor,

    Unfortunately I don’t have something about the Controller based AP. You can subscribe to my blog if you want and I’ll let you know for new posts published here if interested.

  3. Khalid MOUSSAOUI says

    October 19, 2018 at 2:10 pm

    Hello Andrea,
    Thank you for your support and your integration,
    Please, can you send me the configuration with a WiFi SSID.

    Best regards

  4. Harris Andrea says

    October 19, 2018 at 3:00 pm

    I don’t have it now. It has been a long time when I first configured that router

  5. Praful says

    September 20, 2019 at 1:23 am

    Hello

    My nephew wanted me to configure his Cisco 886VAW router. Neither of us has ever configured a Cisco router!

    I’ve managed to connect via a usb-serial cable.

    Using your guide, I have got the wifi working: I can connect to the router via the guest network and get allocated an IP address in the correct range. However, I can’t access the internet. On the router and ap, I can’t ping the internet either.

    My problem is configuring the WAN. I have no interface Fa4. I have tried Fa0, which is connected to the ISP router. When following your guide for the WAN setting, I can’t set an IP address for Fa0. I get a message saying “IP addresses may not be configured on L2 links”

    Is the 1.1.1.1 bit of the WAN config correct.

    The router has four ethernet ports. I’m assuming one of those can be used as a WAN port?

    I would be grateful for any help!

    Thanks

  6. Harris Andrea says

    September 20, 2019 at 12:39 pm

    Hello, I believe you have connected the wrong port to the WAN. It’s usually Fa4 not Fa0. Between Fa0 and Fa3 are used for LAN connections.

    Also, the config showing 1.1.1.1 on the WAN is just an example. You need to know if the ISP provides a static IP and configure this to the WAN or if the ISP offers dynamic IP so you must configure DHCP on the WAN.

  7. Praful says

    October 9, 2019 at 4:43 pm

    Thank you for the reply. I have four ports on the back. Where is the WAN port on the back of the 886VAW router?!

    I assumed I had to connect one of the four LAN ports to the ISP router. Do I connect the one called DATA BRI?

    Thanks
    Praful

  8. Harris Andrea says

    October 9, 2019 at 6:41 pm

    The 886VA-W is an ADSL, VDSL router so there must be a wan port to connect to the ISP (a telephone-like RJ11 port). The DATA BRI is for backup purposes (connects to ISDN BRI)

  9. Praful says

    October 9, 2019 at 7:51 pm

    Yes, there is an ADSL port on the 886. I was hoping to connect to the already configured ISP router via ethernet. Could I do this via one of the LAN ports or do I have to connect to the phone line?

  10. Harris Andrea says

    October 10, 2019 at 4:47 am

    sorry I didn’t understand that you already have an ISP router in place. The scenario you are describing (i.e to connect a LAN port to the ISP router) is not a standard way of doing things. I haven’t tried it. It might work if you configure the cisco router to work purely in AP mode and have the ISP router to assign IP addresses to wifi clients.

  11. Praful says

    October 10, 2019 at 12:44 pm

    Thanks Harris for your help again.

    Please could you provide some pointers how I could do that?

    Thanks
    Praful

  12. Harris Andrea says

    October 10, 2019 at 1:34 pm

    Sorry I haven’t done it before. As I said, this is not a usual configuration.

  13. Praful says

    October 10, 2019 at 4:07 pm

    OK – thanks for engaging.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search this site

About Networks Training

We Provide Technical Tutorials and Configuration Examples about TCP/IP Networks with focus on Cisco Products and Technologies. This blog entails my own thoughts and ideas, which may not represent the thoughts of Cisco Systems Inc. This blog is NOT affiliated or endorsed by Cisco Systems Inc. All product names, logos and artwork are copyrights/trademarks of their respective owners.

Amazon Disclosure

As an Amazon Associate I earn from qualifying purchases.
Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.

Search

BLOGROLL

Tech21Century
Firewall.cx

Copyright © 2023 | Privacy Policy | Terms and Conditions | Hire Me | Contact | Amazon Disclaimer | Delivery Policy

16 shares